From bb9487a58123c8bb92536ae36ac87953810c5b48 Mon Sep 17 00:00:00 2001 From: Stefan Schantl Date: Fri, 6 Jan 2012 22:27:02 +0100 Subject: [PATCH] Remove module for firewallgui. --- policy/modules/apps/firewallgui.fc | 3 -- policy/modules/apps/firewallgui.if | 41 -------------- policy/modules/apps/firewallgui.te | 74 -------------------------- policy/modules/roles/staff.te | 4 -- policy/modules/roles/unconfineduser.te | 4 -- policy/modules/system/modutils.te | 4 -- 6 files changed, 130 deletions(-) delete mode 100644 policy/modules/apps/firewallgui.fc delete mode 100644 policy/modules/apps/firewallgui.if delete mode 100644 policy/modules/apps/firewallgui.te diff --git a/policy/modules/apps/firewallgui.fc b/policy/modules/apps/firewallgui.fc deleted file mode 100644 index ce498b3f..00000000 --- a/policy/modules/apps/firewallgui.fc +++ /dev/null @@ -1,3 +0,0 @@ - -/usr/share/system-config-firewall/system-config-firewall-mechanism.py -- gen_context(system_u:object_r:firewallgui_exec_t,s0) - diff --git a/policy/modules/apps/firewallgui.if b/policy/modules/apps/firewallgui.if deleted file mode 100644 index 2bd5790b..00000000 --- a/policy/modules/apps/firewallgui.if +++ /dev/null @@ -1,41 +0,0 @@ - -## policy for firewallgui - -######################################## -## -## Send and receive messages from -## firewallgui over dbus. -## -## -## -## Domain allowed access. -## -## -# -interface(`firewallgui_dbus_chat',` - gen_require(` - type firewallgui_t; - class dbus send_msg; - ') - - allow $1 firewallgui_t:dbus send_msg; - allow firewallgui_t $1:dbus send_msg; -') - -######################################## -## -## Read and write firewallgui unnamed pipes. -## -## -## -## Domain to not audit. -## -## -# -interface(`firewallgui_dontaudit_rw_pipes',` - gen_require(` - type firewallgui_t; - ') - - dontaudit $1 firewallgui_t:fifo_file rw_inherited_fifo_file_perms; -') diff --git a/policy/modules/apps/firewallgui.te b/policy/modules/apps/firewallgui.te deleted file mode 100644 index 175de9de..00000000 --- a/policy/modules/apps/firewallgui.te +++ /dev/null @@ -1,74 +0,0 @@ -policy_module(firewallgui,1.0.0) - -######################################## -# -# Declarations -# - -type firewallgui_t; -type firewallgui_exec_t; -dbus_system_domain(firewallgui_t, firewallgui_exec_t) - -type firewallgui_tmp_t; -files_tmp_file(firewallgui_tmp_t) - -######################################## -# -# firewallgui local policy -# - -allow firewallgui_t self:capability { net_admin sys_rawio } ; -allow firewallgui_t self:fifo_file rw_fifo_file_perms; - -manage_files_pattern(firewallgui_t,firewallgui_tmp_t,firewallgui_tmp_t) -manage_dirs_pattern(firewallgui_t,firewallgui_tmp_t,firewallgui_tmp_t) -files_tmp_filetrans(firewallgui_t,firewallgui_tmp_t, { file dir }) - -kernel_read_system_state(firewallgui_t) -kernel_read_network_state(firewallgui_t) -kernel_rw_net_sysctls(firewallgui_t) -kernel_rw_kernel_sysctl(firewallgui_t) -kernel_rw_vm_sysctls(firewallgui_t) - -corecmd_exec_shell(firewallgui_t) -corecmd_exec_bin(firewallgui_t) - -dev_read_urand(firewallgui_t) -dev_read_sysfs(firewallgui_t) - -files_manage_system_conf_files(firewallgui_t) -files_etc_filetrans_system_conf(firewallgui_t) -files_read_etc_files(firewallgui_t) -files_read_usr_files(firewallgui_t) -files_search_kernel_modules(firewallgui_t) -files_list_kernel_modules(firewallgui_t) - -auth_use_nsswitch(firewallgui_t) - -miscfiles_read_localization(firewallgui_t) - -seutil_read_config(firewallgui_t) - -userdom_dontaudit_search_user_home_dirs(firewallgui_t) - -optional_policy(` - consoletype_exec(firewallgui_t) -') - -optional_policy(` - gnome_read_gconf_home_files(firewallgui_t) -') - -optional_policy(` - iptables_domtrans(firewallgui_t) - iptables_initrc_domtrans(firewallgui_t) - iptables_systemctl(firewallgui_t) -') - -optional_policy(` - modutils_getattr_module_deps(firewallgui_t) -') - -optional_policy(` - policykit_dbus_chat(firewallgui_t) -') diff --git a/policy/modules/roles/staff.te b/policy/modules/roles/staff.te index 815d09f7..dedcb9aa 100644 --- a/policy/modules/roles/staff.te +++ b/policy/modules/roles/staff.te @@ -86,10 +86,6 @@ optional_policy(` gnomeclock_dbus_chat(staff_t) ') -optional_policy(` - firewallgui_dbus_chat(staff_t) -') - optional_policy(` gnome_role(staff_r, staff_t) ') diff --git a/policy/modules/roles/unconfineduser.te b/policy/modules/roles/unconfineduser.te index 2794ccdb..dde8e418 100644 --- a/policy/modules/roles/unconfineduser.te +++ b/policy/modules/roles/unconfineduser.te @@ -246,10 +246,6 @@ optional_policy(` ') ') -optional_policy(` - firewallgui_dbus_chat(unconfined_t) -') - optional_policy(` firstboot_run(unconfined_t, unconfined_r) ') diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te index 6b397569..80884caa 100644 --- a/policy/modules/system/modutils.te +++ b/policy/modules/system/modutils.te @@ -205,10 +205,6 @@ optional_policy(` firstboot_dontaudit_leaks(insmod_t) ') -optional_policy(` - firewallgui_dontaudit_rw_pipes(insmod_t) -') - optional_policy(` hal_write_log(insmod_t) ') -- 2.47.3